Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys

نویسندگان

چکیده

Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks cryptocurrency exchange accounts. In this scheme, separate public and private key pair assigned to every account the shifted either forward or backward elliptic curve by difference of user’s password. When user logs into his account, server sends account. The computes actual reverse shifting exactly Alternatively, can be applied generator instead key. Described in detail as how aman-in-the-middle attack takes place proposed scheme attack. Provided detailed security analysis both cases publickey shifting. Further, compared effectiveness another three authentication schemes defending passwords against MITM attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized MitM attacks on full TWINE

TWINE is a lightweight block cipher which employs a generalized Feistel structure with 16 nibble-blocks. It has two versions: TWINE-80 and TWINE-128, both have a block length of 64 bits and employ keys of length 80 and 128 bits, respectively. In this paper, we propose a low data complexity key recovery attack on the full cipher. This attack is inspired by the 3-subset Meet-in-the-Middle (MitM) ...

متن کامل

Stealth-MITM DoS Attacks on Secure Channels

We de ne stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: 1. First amplifying DoS attack on IPsec, when deployed without anti-replay window. 2. First amplifying attack on IPsec, when deployed with a `small...

متن کامل

Sieve-in-the-Middle: Improved MITM Attacks

This paper presents a new generic technique, named sievein-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. C...

متن کامل

Securing e-voting against MITM attacks

Man in the middle attacks involve the interception and retransmission of electronic messages in a way that the original parties will presume that their communication is secure. Such an attack could be a threat to any electronic voting scenario. This paper proposes a novel method for preventing this kind of attacks by including in the transaction a challenge-response test. The human end-user is ...

متن کامل

Defeating Cyber Attacks Due to Script Injection

Offensive operations have been promoted by the aggressors using computer as a tool or target, resulting, a cyber attack in web-applications of an organization or the infrastructure of entire nation. Depending upon the attacker’s target, one can classify some of the mostly occurred cyber attacks into five broad categories. It reports some of the common methods adopted in conducting these attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of network security and applications

سال: 2021

ISSN: ['0975-2307', '0974-9330']

DOI: https://doi.org/10.5121/ijnsa.2021.13104